Authorities warn of global cyber campaign by Russian intelligence
The British cyber security agency National Cyber Security Center (NCSC) warns that the Russian foreign intelligence service, Sluzhba Vneshney Razvedki (SVR), is conducting a global campaign...
View ArticleGovernments fear election interference, but it’s an enterprise cybersecurity...
Election security is a topic that percolates to the forefront every couple of years, especially as US national elections hit the calendar. There have been more than 60 national elections in play...
View Article10 most critical LLM vulnerabilities
The Open Worldwide Application Security Project (OWASP) lists the top 10 most critical vulnerabilities often seen in large language model (LLM) applications. Prompt injections, poisoned training data,...
View ArticleAlleged Cisco data breach could affect Microsoft, Barclays, and SAP developer...
Notorious hacker “IntelBroker” is offering to sell a large amount of sensitive data from Cisco allegedly stolen from a June 2024 breach along with two fellow hackers the threat actor called...
View ArticleWhy are we still confused about cloud security?
A report by cloud security company Tenable discovered that 74% of companies surveyed had exposed storage or other misconfigurations. This is a dangerous open door to cybercriminals. Overall, cloud...
View ArticleCSO – neuer Web-Auftritt, noch bessere Information
Probieren Sie die neue Website aus.Gorodenkoff / Shutterstock Das CSO-Portal bildet die wichtigste Quelle für alle Entscheidungsträger, sich über sämtliche Aspekte im Bereich Unternehmenssicherheit zu...
View ArticleUS DoD finalizes CMMC cyber rules for suppliers
A new rule by the US Department of Defense to ensure that Defense Industrial Base contractors and subcontractors are implementing information security measures required by the federal government is...
View ArticleWhat is the cost of a data breach?
For modern businesses regardless of industry or size, the monetary impact of a data breach is substantial. IBM’s latest Cost of a Data Breach report discovered that, from March 2023 to February 2024,...
View ArticleCISOs grapple with a growing concern: Stress-related substance abuse
A few years ago, Olivia Rose lived on adrenaline as an “always-on” corporate CISO. Constant meetings made it hard for her to finish what she had started, and she spent significant time managing a team...
View ArticleOkta’s new security standard to be adopted by Google, Microsoft
Identity and access management (IAM) solutions provider Okta has announced a new, open-source identity security standard for SaaS providers, calling it the Interoperability Profile for Secure Identity...
View ArticleVerseuchte Open-Source-Pakete explodieren
Einem neuen Bericht des Software-Supply-Chain-Management-Unternehmens Sonatype zufolge dringt Malware alarmierend schnell in das Ökosystem der Open-Source-Softwareentwicklung ein. Das Unternehmen hat...
View ArticleCato Networks extends SASE platform with digital experience monitoring
Cato Networks today introduced digital experience monitoring (DEM) capabilities that will augment the company’s cloud SASE platform with application traffic and network performance data that IT...
View ArticleNetskope extends data security with Dasera acquisition
Netskope today announced it has broadened its data protection capabilities by integrating data security posture management (DSPM) technology into its Netskope One Platform via its acquisition of...
View ArticleNew Fido standard for passkeys will make it easier to change services
The organization Fido Alliance has developed a proposal for a new standard for passkeys — i.e., alternatives to passwords such as hardware keys, facial recognition, fingerprints or PIN codes. The big...
View ArticleAttackers repurpose EDRSilencer to evade detection
Attackers have weaponized yet another tool developed for penetration testing and red team exercises to enhance their attacks. The tool, dubbed EDRSilencer, leverages the Windows Filtering Platform...
View ArticleHow AI is becoming a powerful tool for offensive cybersecurity practitioners
Artificial intelligence, especially large language models (LLMs) and the agents powered by them, has been transformative across the cybersecurity spectrum, and the game-changing technology has been...
View ArticleChinese cybersecurity association urges review of Intel products
The Cybersecurity Association of China (CSAC) has urged a security review of Intel products sold in the country, claiming the US semiconductor firm poses ongoing threats to China’s national security...
View ArticleCritical SolarWinds flaw finds exploitations in the wild despite available fixes
A security oversight by SolarWinds developers in August allowing remote access to sensitive credentials within its Web Help Desk (WHD) product has found active exploitations in the wild. According to...
View ArticleDie 6 größten Cyberbedrohungen im Gesundheitswesen
Organisationen im Gesundheitswesen müssen damit rechnen, dass Ransomware, Botnets, Cloud-Schwachstellen, Angriffe auf Webanwendungen, Phishing und intelligente Geräte zu ihren größten Risiken...
View ArticleCSO30 Australia 2024 winners unveiled at gala ceremony
Australia’s top cybersecurity leaders and their teams have been recognised at this year’s CSO30 Awards. Held in conjunction with the CIO50, the CSO30 Australia Awards is aligned to Foundry’s global...
View Article